DR LEE BUCHANAN Venture Partner PALADIN CAPITAL GROUP.

Slides:



Advertisements
Similar presentations
Company Oy (this is a model template for NIY- pitch. Use your own slide templates)
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
Data Security Israel Mazin, Founding Partner & Chairman.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Formulating a Security Policy for the Modern IT Landscape.
Controls for Information Security
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Welcome to the Cloud Era Mohammed Owais.
NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Smart Grid Technologies Damon Dougherty – Industry Manager.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Cloud Models – Iaas, Paas, SaaS, Chapter- 7 Introduction of cloud computing.
Signature Based and Anomaly Based Network Intrusion Detection
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
How venture capitalists evaluate potential venture opportunities
1 1 Hosted Network Security EarthLink Complete™ Data.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Expected Impact of Information Technology on a Global Business PRESENTED BY:
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Cyber security implementation within an organization Ltn Andri Rebane Estonian MoD CIO.
Accumulus Delivers Enterprise Class Subscription Billing and Automation Solutions for Gaming, Retail, and More on the Scalable Microsoft Azure Platform.
Deconstructing API Security
Increase Revenues and Customer Satisfaction Build a Well-Defined Onboarding Process 09/23/2013.
Copyright © 2008 Juniper Networks, Inc. 1 Juniper Networks Access Control Solutions Delivering Comprehensive and Manageable Network Access Control Solutions.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Introducing: Chengdu’s Industrial Cloud Huawei & GDS Services Industrial Cloud Solution for SMEs Author/ID: Zhao Zhijuan/ Dept: Industry Solutions.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
IXIA + FIREEYE SECURITY BATTLECARD
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Industrial Control Systems.
Your Partner for Superior Cybersecurity
OIT Security Operations
Avenues International Inc.
“Introduction to Azure Security Center”
Not to Make You Paranoid, But …
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Active Cyber Security, OnDemand
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
I have many checklists: how do I get started with cyber security?
Healthcare Cloud Security Stack for Microsoft Azure
EU GDPR a Cyber Security Perspective
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Identity & Access Management
Firewalls Types of Firewalls Inspection Methods Firewall Architecture
Healthcare Cloud Security Stack for Microsoft Azure
Cloud adoption NECOOST Advisory | June 2017.
DATS International Portfolio.
Industrializing AI.
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Technology Convergence
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
GRC - A Strategic Approach
Fy ‘08 NETWORK PLANNING TASK FORCE
Presentation transcript:

DR LEE BUCHANAN Venture Partner PALADIN CAPITAL GROUP

Paladin Capital Group 5 th World Cyber Security Technology Research Summit H. Lee Buchanan Ph.D.

Prevent Detect/ID RemediateForensics Functional Ecosystem

Encryption Firewalls Whitelist VPNs Containers Authentication Prevent Detect/ID RemediateForensics Intelligence-Based Health Monitoring Machine Learning Deep Packet Inspect Training Network Visibility Isolation Response Protocols Continuity Data Log Kill Chain Analysis Prevalent Technologies

Prevent Detect/ID Remediate Forensics Relative Investment

● Security is a Cost Center (Not a Profit Center) ● Market is Bifurcated − “ Haves” Looking for a Chaffered Rolls Royce − “Have-Nots” Looking for a Standard KIA ● Cyber-Security is Very Talent Intensive ● Rapid Evolution − Antivirus Anti-Malware − Intrusion Detection Intrusion Prevention (host and network) − Standalone subsectors Integrated Offerings Market Factors

Ideal Investment Wave A change taking place in an industry that will drive urgent spending. Team A team that can execute, particularly and “engine of innovation that will continue to keep a company competitive. Advantage Some unfair advantage – often, but not always, technology - that will inhibit competition. White Space A broad enough market opportunity to allow for adjacent expansion. Value Add Opportunity for Paladin to materially benefit the company more than other investors.

What Hasn't Worked (Yet) ● Intelligence-Based Firewalls Too many threats, They come too fast ● Containers (except for Government) Move is away from enterprise provisioning ● Two-factor Authentication Effective, but too disruptive of User Experience ● Machine Learning (or anything else) for Detection Training Patterns are Changing too Fast ● Detection is Easy, Identification is Hard

What’s Needed ● Process Automation (Eliminate the Standing Armies) ● Automated Prioritization ● 80% Effectiveness at 20% of the Price (Have-Nots) ● Integrated Service Models (Security-as-a-Service) ● “Everybody a Firefighter” Approach ● Anything to Address the Insider Threat ● Effective Ways to Protect Critical Infrastructure